Preview

E-Voting by Using Biometrics

Best Essays
Open Document
Open Document
2584 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Voting by Using Biometrics
Majan College
MSC. In Computer Science
Secure Data Communication

E-Voting by using biometrics

Study of using Fingerprints and Iris in e-voting

Presented by: Muna Al-Busaidi.
Student ID:1032796

Presented to: Mr.Ramalingam D.

Answer for question (1) section (A):
Introduction
Biometrics is a technique to verify identity based on the unique physiological characteristic (physical and behavior) of human body such as finger print, iris, voice, DNA, face and signature, that can be identified using computer system where it can be stored in database.
The benefits of using biometrics are listed –but not limited to- the below points: 1. Providing security. 2. Speed in verification of identity. 3. Avoiding/minimizing fraud. 4. High availability.(Ahmed, 2010)
In gulf country the suitable methods for e-voting are: Fingerprint and Iris. “Fingerprint is the cheapest, fastest, most suitable and most reliable way to identify someone. And the tendency, due to scale, easiness and the existing foundation, is that the use of fingerprint will only increase”(Sul, 2011).
Fingerprint scanners are the most commonly used biometric system in the World. It is impossible to duplicate another person 's fingerprint in a form that the scanner will recognize. Fingerprint scanner works as follow: the client scan his finger in the scanner. The scanner automatically read the fingerprint and identifies it by comparing the original fingerprint image with stored templates image in the database. The metrics used in fingerprint-based authentication rely on the relative positions found for the minutiae. There are two facts about fingerprints, first fingerprints never change, second No two fingerprints are identical (Gaensslen, 2001).
“Obviously, iris is a high reliable biometric technology for its stability and the high variation degree between individuals. It has enormous pattern of variability among its different individuals. Unlike DNA and fingerprint, iris is



Bibliography: A.Forouzan, B., 2008. Cryptography & Network Security. new delhi: Tata Mc Graw. Hill campanies. Ahmed, f., 2010. biometrics & infomation security. In 6th annual confeence for saudi library and information association. riyadh , 2010. saudi library and information association. Al-Raisi, A.N. & Al-Khouri, A.M., 2006. Iris recognition and the challenge of homeland and border control security in UAE. Abu Dhabi: Elsevier Ltd. BILAL, M.B., 2000. ‘FAIR’ BPEL PROCESSES TRANSACTION USING NON-REPUDIATION PROTOCOLS. Lahore: University of Engineering & Technology University of Engineering & Technology. Components, i., 2011. OCR Components ICR Components & OMR Components. [Online] [Accessed 30 April 2011]. Gaensslen, H.C.L.a.R.E., ed., 2001. Advances of Fingepint Technology. second edition ed. Boca Raton: CRC Press. imaging components, 2011. OCR Components, ICR Components & OMR Components. [Online] Available at: HYPERLINK "www.imaging-components.com/Imaging-Components" www.imaging-components.com/Imaging-Components [Accessed 30 April 2011]. King, D.S., 2002. Testing Iris and Face Recognition in a Personnel Identification Application. Office of the Deputy Under Secretary of Defense. Kremer, O.M.a.S., n.d. An Optimistic Non-Repudiation Protocol with Transparent Trusted Third Party. 1050 Bruxelles Belgium: Universit¶e Libre de Bruxelles. Microsoft, 2011. Threats and Countermeasures for Web Services. [Online] Available at: HYPERLINK "http://msdn.microsoft.com/en-us/library/cc949001.aspx" http://msdn.microsoft.com/en-us/library/cc949001.aspx [Accessed 12 May 2011]. Sul, S., 2011. Classification-based Automatic Fingerprint Identification System for Large Distributed Fingerprint Database. Biometrics & Biostatistics, p.3. Vigneron, L., 2007. Optimistic Non-Repudiation Protocol Analysis. presentation. Heraklion: LORIA LORIA, Nancy-Universit.

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The global biometric systems industry is highly competitive, with large numbers of suppliers catering to the requirements of countries around the globe. North American and European countries, which are among the leading defense spenders, have well-developed domestic biometric systems industries, making them self-reliant.…

    • 634 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Jain, A.K., Hong, L. and Pankanti S. "Biometric Identification," Communications of the ACM, Vol. 43, No.2, pp. 90 – 98, February 2000.…

    • 1900 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Biometrics Term Paper

    • 733 Words
    • 3 Pages

    handwriting, the way that you walk, etc. There are also two categories for the use of this…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Security

    • 5677 Words
    • 23 Pages

    These days, hot products like mobile phones, GPS and computers can be secured at the touch of a fingerprint. Designing in security at the start of a new product development process is more effective than adding it on later. Unlocking your mobile phone by scanning your fingerprint is not a thing of science fiction. It’s an everyday reality for millions of mobile phone users, the greatest proportion of who live in Asia. But designing-in security to mobile phones can be difficult. PIN codes and passwords take too long to enter and users often disable them. Since everyone has a unique fingerprint, biometric technology companies have shown that security at the touch of a fingerprint can be an alternative for portable electronic products. Fingerprint recognition can be implemented in essentially all mobile devices and has the right combination of security, cost and convenience for the end-user. It has the potential to be the single personal identifier that can work with every element of your IT security solution, from the mobile device to the PC, the network, servers, applications and whatever else might be required today, or tomorrow. Fingerprint recognition technology for mobile devices is poised to become the preferred user authentication solution mobile device security. Fingerprint tech is a standard security feature around the world. It works because no - two people not even identical twins have the same fingerprints. Believe it or not, fingerprinting is actually pretty old. It began in eighth-century in Japan. But this ancient approach to security is about to get a big upgrade. Since many smartphones have touch-sensitive screens, by definition, they work with your fingertips. All we need to do is convert that screen into a scanner that takes the place of a password. That way, it only works for you. If you lose your phone or someone steals it, the device goes dead.…

    • 5677 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Fingerprint Recognition

    • 1219 Words
    • 5 Pages

    Verification : It validates a person’s identity by comparing captured biometric data with readymade template. Identification : It helps to recognize a person’s identity by performing matches against multiple fingerprint biometric templates.…

    • 1219 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Evaluating Biometric System

    • 5288 Words
    • 22 Pages

    n the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the performance estimates of these systems are far more impressive than their actual performance? To measure the real-life performance of biometric systems—and to understand their strengths and weaknesses better—we must understand the elements that comprise an ideal biometric system. In an ideal system • all members of the population possess the characteristic that the biometric identifies, like irises or fingerprints; • each biometric signature differs from all others in the controlled population; • the biometric signatures don’t vary under the conditions in which they are collected; and • the system resists countermeasures. Biometric-system evaluation quantifies how well biometric systems accommodate these properties. Typically, biometric evaluations require that an independent party design the evaluation, collect the test data, administer the test, and analyze the results. We designed this article to provide you with sufficient information to know what questions to ask when evaluating a biometric system, and to assist you in determining if performance levels meet the requirements of your application. For example, if you plan to use a biometric to reduce—as opposed to eliminate— fraud, then a low-performance biometric system may be sufficient. On the other hand, completely replacing…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Powerful Essays

    Biometrics

    • 2828 Words
    • 12 Pages

    A PAPER ON Biometrics Submitted By MR. TAPSE PRAVINKUMAR NARSING T.E.(ENTC) Email:- tapse_pravinkumar@rediffmail.com & MR.…

    • 2828 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    at whatever time user place his finger over fingerprint module then fingerprint module captures finger image, and look for if any ID is associated with this fingerprint in the system. If fingerprint ID is identified then LCD will show Attendance registered and in the same time buzzer will beep once as well as LED will turn off until the system is all set to take input again.…

    • 710 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nowadays a lot of security devices were introduced like alarms, codes detectors, and biometric systems that we can use but biometrics system is the most effective and is the highest level of security system in our generation. Biometrics system refers to an automated system that can identify an individual by measuring their physical and behavioral uniqueness or patterns, and comparing it to those on record. It can identify fingerprints, face, iris, palm prints, signature, DNA, or retinas of an individual for easy and convenient verification ( www.ex-sight.com ). This system was first used by the Chinese in 14th century where merchants used children’s palm and footprints to distinguish them from one another.…

    • 336 Words
    • 2 Pages
    Good Essays

Related Topics